Architecture for Protecting Critical Secrets in Microprocessors
- 28 July 2005
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 33 (2) , 2-13
- https://doi.org/10.1109/isca.2005.14
Abstract
We propose "secret-protected (SP)" architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of critical secrets, and key protection and management is a fundamental problem 驴 often assumed but not solved 驴 underlying the use of cryptographic protection of sensitive files, messages, data and programs. SP-processors contain a minimalist set of architectural features that can be built into a general-purpose microprocessor to provide protection of critical secrets and their computations, without expensive or inconvenient auxiliary hardware. SP-architecture also requires a trusted software module, a few modifications to the operating system, a secure I/O path to the user, and a secure installation process. Unique aspects of our architecture include: decoupling of user secrets from the devices, enabling users to securely access their keys from different networked computing devices; the use of symmetric master keys rather than more costly public-private key pairs; and the avoidance of any permanent or factory-installed device secrets.Keywords
This publication has 12 references indexed in Scilit:
- Protecting cryptographic keys and computations via virtual secure coprocessingACM SIGARCH Computer Architecture News, 2005
- AEGISPublished by Association for Computing Machinery (ACM) ,2003
- Networked cryptographic devices resilient to capturePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Enabling trusted software integrityPublished by Association for Computing Machinery (ACM) ,2002
- The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?)Published by Springer Nature ,2001
- Building a high-performance, programmable secure coprocessorComputer Networks, 1999
- Using a high-performance, programmable secure coprocessorPublished by Springer Nature ,1998
- Secure distributed storage and retrievalPublished by Springer Nature ,1997
- High-bandwidth encryption with low-bandwidth smartcardsPublished by Springer Nature ,1996
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978